A research team from Northeastern University has shown that they could manipulate core systems inside the Tesla operating environment by exploiting vulnerabilities in the vehicle’s internal networking ...